Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EXPORT INVOICE.pdf.scr

Overview

General Information

Sample Name:EXPORT INVOICE.pdf.scr (renamed file extension from scr to exe)
Analysis ID:625078
MD5:2cf09341b87d20404a6d824305ea5419
SHA1:ec9de894d7cb09ed3940db31dfc7a39cc1280acd
SHA256:2b21885c68cf8bcee3be7e08574372130a42c74a047b1f962cc5e270bb7b543e
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
Machine Learning detection for sample
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
One or more processes crash
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Detected potential crypto function

Classification

  • System is w10x64
  • EXPORT INVOICE.pdf.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe" MD5: 2CF09341B87D20404A6D824305EA5419)
    • WerFault.exe (PID: 5336 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 1280 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EXPORT INVOICE.pdf.exeAvira: detected
Source: EXPORT INVOICE.pdf.exeVirustotal: Detection: 37%Perma Link
Source: EXPORT INVOICE.pdf.exeReversingLabs: Detection: 34%
Source: EXPORT INVOICE.pdf.exeJoe Sandbox ML: detected
Source: EXPORT INVOICE.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: EXPORT INVOICE.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: System.Core.ni.pdbRSDSD source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Accessibility.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: .pdb08 source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: EXPORT INVOICE.pdf.PDB source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: (P5oLC:\Windows\Microsoft.VisualBasic.pdb source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdbH source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Windows.Forms.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Microsoft.VisualBasic.pdb4" source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: np@oVisualBasic.pdb source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: C:\Users\user\Desktop\EXPORT INVOICE.pdf.PDB source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.370373493.000000000867D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wM
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comionm
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.371092907.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.371092907.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371043084.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371160843.000000000867D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com;
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.371043084.000000000867D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comW
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comWT
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnD
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cndnl
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.379986920.000000000864D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.379854422.000000000864E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comrmW
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.371908716.0000000008647000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
Source: EXPORT INVOICE.pdf.exe, 00000001.00000003.373268434.0000000008648000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.373229768.0000000008647000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netr
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

System Summary

barindex
Source: initial sampleStatic PE information: Filename: EXPORT INVOICE.pdf.exe
Source: initial sampleStatic PE information: Filename: EXPORT INVOICE.pdf.exe
Source: EXPORT INVOICE.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: EXPORT INVOICE.pdf.exeBinary or memory string: OriginalFilename vs EXPORT INVOICE.pdf.exe
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.364000331.0000000000FB2000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameIRuntimeEvidenceFact.exe< vs EXPORT INVOICE.pdf.exe
Source: EXPORT INVOICE.pdf.exe, 00000001.00000000.412654077.000000000A0E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFort.dll" vs EXPORT INVOICE.pdf.exe
Source: EXPORT INVOICE.pdf.exe, 00000001.00000002.432550901.000000000329A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFort.dll" vs EXPORT INVOICE.pdf.exe
Source: EXPORT INVOICE.pdf.exeBinary or memory string: OriginalFilenameIRuntimeEvidenceFact.exe< vs EXPORT INVOICE.pdf.exe
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 1280
Source: EXPORT INVOICE.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0327216B1_2_0327216B
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032717681_2_03271768
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0327B52C1_2_0327B52C
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032704D01_2_032704D0
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03270FD81_2_03270FD8
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032733131_2_03273313
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032753E81_2_032753E8
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032753F81_2_032753F8
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032732051_2_03273205
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032731201_2_03273120
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032751B11_2_032751B1
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032731841_2_03273184
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032751C01_2_032751C0
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032730701_2_03273070
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032756291_2_03275629
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032756381_2_03275638
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0327352C1_2_0327352C
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_032734AF1_2_032734AF
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03274B381_2_03274B38
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03274B481_2_03274B48
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0327580B1_2_0327580B
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03272F791_2_03272F79
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03273FB11_2_03273FB1
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03270F921_2_03270F92
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_03273FC01_2_03273FC0
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0A0C8A901_2_0A0C8A90
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_0A0CEFC01_2_0A0CEFC0
Source: EXPORT INVOICE.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: EXPORT INVOICE.pdf.exeVirustotal: Detection: 37%
Source: EXPORT INVOICE.pdf.exeReversingLabs: Detection: 34%
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeFile read: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeJump to behavior
Source: EXPORT INVOICE.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe "C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe"
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 1280
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7108
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3FE.tmpJump to behavior
Source: classification engineClassification label: mal68.evad.winEXE@2/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: EXPORT INVOICE.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: EXPORT INVOICE.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: System.Core.ni.pdbRSDSD source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Xml.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Accessibility.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: .pdb08 source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Configuration.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: EXPORT INVOICE.pdf.PDB source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: (P5oLC:\Windows\Microsoft.VisualBasic.pdb source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdbH source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Core.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Microsoft.VisualBasic.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Windows.Forms.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: Microsoft.VisualBasic.pdb4" source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: np@oVisualBasic.pdb source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Drawing.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: mscorlib.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.Core.pdb source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: C:\Users\user\Desktop\EXPORT INVOICE.pdf.PDB source: EXPORT INVOICE.pdf.exe, 00000001.00000002.431660195.0000000001357000.00000004.00000010.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.413234649.0000000001357000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.Xml.ni.pdbRSDS source: WERC3FE.tmp.dmp.7.dr
Source: Binary string: System.ni.pdb source: WERC3FE.tmp.dmp.7.dr
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_00EF23FC push esp; ret 1_2_00EF23FE
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeCode function: 1_2_00EF2418 push cs; retf 1_2_00EF2422
Source: initial sampleStatic PE information: section name: .text entropy: 7.63374734815

Hooking and other Techniques for Hiding and Protection

barindex
Source: Possible double extension: pdf.exeStatic PE information: EXPORT INVOICE.pdf.exe
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe TID: 7112Thread sleep time: -45733s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeThread delayed: delay time: 45733Jump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Fonts\GILSANUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\EXPORT INVOICE.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
Software Packing
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Process Injection
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common12
Obfuscated Files or Information
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EXPORT INVOICE.pdf.exe37%VirustotalBrowse
EXPORT INVOICE.pdf.exe34%ReversingLabsByteCode-MSIL.Trojan.Generic
EXPORT INVOICE.pdf.exe100%AviraHEUR/AGEN.1202539
EXPORT INVOICE.pdf.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
1.2.EXPORT INVOICE.pdf.exe.ef0000.0.unpack100%AviraHEUR/AGEN.1244320Download File
1.0.EXPORT INVOICE.pdf.exe.ef0000.0.unpack100%AviraHEUR/AGEN.1244320Download File
1.0.EXPORT INVOICE.pdf.exe.ef0000.1.unpack100%AviraHEUR/AGEN.1244320Download File
1.0.EXPORT INVOICE.pdf.exe.ef0000.4.unpack100%AviraHEUR/AGEN.1244320Download File
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cndnl0%Avira URL Cloudsafe
http://en.wM0%Avira URL Cloudsafe
http://www.sakkal.comrmW0%Avira URL Cloudsafe
http://www.tiro.com0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.fontbureau.coma0%URL Reputationsafe
http://www.fonts.comW0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.founder.com.cn/cnD0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.founder.com.cn/cn/0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.fonts.comWT0%Avira URL Cloudsafe
http://www.typography.net0%URL Reputationsafe
http://www.fontbureau.comionm0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.fontbureau.como0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.typography.netr0%Avira URL Cloudsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.fonts.com;0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.fontbureau.comEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.fontbureau.com/designersGEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com/designers/?EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cndnlEXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers?EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://en.wMEXPORT INVOICE.pdf.exe, 00000001.00000003.370373493.000000000867D000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.sakkal.comrmWEXPORT INVOICE.pdf.exe, 00000001.00000003.379986920.000000000864D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.379854422.000000000864E000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.comEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designersEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.goodfont.co.krEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comaEXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fonts.comWEXPORT INVOICE.pdf.exe, 00000001.00000003.371043084.000000000867D000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.carterandcone.comlEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cnDEXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.comEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.typography.netDEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers/cabarga.htmlNEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.founder.com.cn/cn/cTheEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.galapagosdesign.com/staff/dennis.htmEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://fontfabrik.comEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cnEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.376953483.0000000008647000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.377031607.0000000008648000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers/frere-jones.htmlEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fonts.comWTEXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.typography.netEXPORT INVOICE.pdf.exe, 00000001.00000003.371908716.0000000008647000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comionmEXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comoEXPORT INVOICE.pdf.exe, 00000001.00000000.415970243.0000000008640000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.galapagosdesign.com/DPleaseEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers8EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fonts.comEXPORT INVOICE.pdf.exe, 00000001.00000003.371092907.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.sandoll.co.krEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netrEXPORT INVOICE.pdf.exe, 00000001.00000003.373268434.0000000008648000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.373229768.0000000008647000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.deDPleaseEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sakkal.comEXPORT INVOICE.pdf.exe, 00000001.00000000.412177175.0000000009852000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.com;EXPORT INVOICE.pdf.exe, 00000001.00000003.371092907.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371043084.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371122582.000000000867D000.00000004.00000800.00020000.00000000.sdmp, EXPORT INVOICE.pdf.exe, 00000001.00000003.371160843.000000000867D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      No contacted IP infos
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:625078
                      Start date and time: 12/05/202211:48:042022-05-12 11:48:04 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:EXPORT INVOICE.pdf.scr (renamed file extension from scr to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal68.evad.winEXE@2/4@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 2.8% (good quality ratio 1.5%)
                      • Quality average: 33.8%
                      • Quality standard deviation: 38.3%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 17
                      • Number of non-executed functions: 20
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 20.189.173.20
                      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      TimeTypeDescription
                      11:49:32API Interceptor1x Sleep call for process: EXPORT INVOICE.pdf.exe modified
                      11:49:44API Interceptor1x Sleep call for process: WerFault.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):1.1180961660191344
                      Encrypted:false
                      SSDEEP:192:8So+ZrokHBUZMXyaKeCikHKvi/u7s+S274ItV3N:NoGssBUZMXyaO/u7s+X4ItV3N
                      MD5:1F31080612E3F6C4532346FCD3D5C016
                      SHA1:E42CCD16F84BFF420021EB2BA9DDC537F737FEFC
                      SHA-256:0B7453D7AA239FECF7864F1B5810B4F239D115F609136131996FADE243151C30
                      SHA-512:A3F6052AD7416A4CEE823CE102D4B70A0CD2776752D9E80DA14F36AAF8403B64BB478A0DA196CF549EA84BD4604F858D75D6F0EEA2FAA9E48C6E64E2E74BF263
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.6.8.5.4.9.8.0.1.9.8.2.6.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.6.8.5.4.9.8.3.5.4.2.0.2.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.4.1.1.6.5.9.5.-.5.a.5.9.-.4.3.a.0.-.9.d.c.7.-.4.7.c.7.9.e.6.5.0.9.1.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.c.a.f.e.2.9.-.b.d.f.a.-.4.b.6.4.-.9.3.1.d.-.8.9.9.1.a.8.1.5.5.e.b.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.E.X.P.O.R.T. .I.N.V.O.I.C.E...p.d.f...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.R.u.n.t.i.m.e.E.v.i.d.e.n.c.e.F.a.c.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.c.4.-.0.0.0.1.-.0.0.1.8.-.3.b.2.f.-.d.e.f.8.3.0.6.6.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.c.3.a.0.5.7.5.0.3.1.8.a.8.8.8.9.c.8.8.1.7.4.f.9.f.2.7.b.8.2.9.0.0.0.0.0.0.0.0.!.0.0.0.0.e.c.9.d.e.8.9.4.d.7.c.b.0.9.e.d.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Thu May 12 18:49:40 2022, 0x1205a4 type
                      Category:dropped
                      Size (bytes):259748
                      Entropy (8bit):4.124164669491366
                      Encrypted:false
                      SSDEEP:3072:nO1ljd+p2SN0o9gIOgF5xc0+TUCgUDHoPtk+Dl0dopIXuq2:O16pV0o9RpDqHTjrmtrR0dX
                      MD5:27132ED0DF055D722D2EC7D30A3BDDD1
                      SHA1:E1849483F307B97C1BE9B2A6DACAFDE31DDE71CD
                      SHA-256:BFC754BC356FF8C2723F75F675A88A0409EC663F30208D4C484859717C3A8C94
                      SHA-512:D89C84400ADEE3F24E833CE23C7A8DADA0D8242E0E40457AEE0C3979B604121CA73CD5F2D0E1240840EE5A24AB8D5D7EFEB03B224B603CB0A0D376A1313CCA83
                      Malicious:false
                      Reputation:low
                      Preview:MDMP....... ........V}b.....................................'...F..........T.......8...........T............1............... ..........."...................................................................U...........B......P#......GenuineIntelW...........T............V}b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8452
                      Entropy (8bit):3.7133404895699718
                      Encrypted:false
                      SSDEEP:192:Rrl7r3GLNiO56B6YfgSUpvy3MgmfZDYSoCpr989bP0sfOFm:RrlsNiY6B6YoSUpvycgmfNYSKPnfd
                      MD5:468747CA40B4B83F9FBB334CD4B3A34D
                      SHA1:E53798256597E7463D2E62655E6935F4EC4F12D0
                      SHA-256:B73923FC0A208D55F89E62E3FB86058EB8C90884C3EF86A17B13A59FBE0A833C
                      SHA-512:EF1C78E9AEE301304FF0E16F83D4055322D1E0855DBE0CB9FC4CD027039F5F251ED4B1B0D437E866D10FCABA644CF7300FDD384E11E6702EEABCEEAA2064977D
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.0.8.<./.P.i.d.>.......
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4805
                      Entropy (8bit):4.563561801184721
                      Encrypted:false
                      SSDEEP:48:cvIwSD8zsTJgtWI9ILyWgc8sqYjw18fm8M4JgB8zL8Fd+q8vozLMPn0ulZpAdOIk:uITftr3grsqYMCJghKnXlrAQIOd
                      MD5:F4BFB7BF17BB4D09E417682C912EE9AC
                      SHA1:4DF54B023773CB7754A7D510F1A2A6E87A0C7B19
                      SHA-256:FBA7016993C3260F687045760192ED38E4B5997D982685365C70CD12B8779250
                      SHA-512:B4563B3E695B5CFDDFF7014ADB27861463172DFD0CA5E264C350065F04AC8AFCFA3562E0ACCA7429DFE3377F04C5F349AE1D52BBF7460E928D88E4932A21CFCE
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1512240" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.125237039189151
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:EXPORT INVOICE.pdf.exe
                      File size:808448
                      MD5:2cf09341b87d20404a6d824305ea5419
                      SHA1:ec9de894d7cb09ed3940db31dfc7a39cc1280acd
                      SHA256:2b21885c68cf8bcee3be7e08574372130a42c74a047b1f962cc5e270bb7b543e
                      SHA512:db8e247a8192ee53b96ee12a9b1e120e904b58b96f5ea3687d10bda3ea16d479bfe2da0db07b633b35bc03da9665d8ebe13a0e494a481bd88a76c30b79c2dbe9
                      SSDEEP:12288:cWRXIfWktOMzKcDOGjBTu2KSgaLfqGC7vh9KBYhLWWZ0u9zfLWt6l/4MKOC6ZEKA:ciXIfWcKwj9wSgajqh7J9K6hLPSu9O
                      TLSH:B905BE9872D0B5AECB07C93289545C25A9203C67439AD20B6CC736DFE9BD69ECE041F3
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{b..............0.................. ........@.. ....................................@................................
                      Icon Hash:24e4c69696b2d4cc
                      Entrypoint:0x4adaee
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x627BF1C4 [Wed May 11 17:26:28 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:v4.0.30319
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xada9c0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x19578.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xabaf40xabc00False0.839913402929data7.63374734815IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rsrc0xae0000x195780x19600False0.0630484144089data1.45882239786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xc80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0xae2200x468GLS_BINARY_LSB_FIRST
                      RT_ICON0xae6880x877PNG image data, 256 x 256, 8-bit colormap, non-interlaced
                      RT_ICON0xaef000x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                      RT_ICON0xb14a80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                      RT_ICON0xb25500x10828dBase III DBT, version number 0, next free block index 40
                      RT_ICON0xc2d780x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                      RT_GROUP_ICON0xc6fa00x5adata
                      RT_VERSION0xc6ffc0x38cPGP symmetric key encrypted data - Plaintext or unencrypted data
                      RT_MANIFEST0xc73880x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      DLLImport
                      mscoree.dll_CorExeMain
                      DescriptionData
                      Translation0x0000 0x04b0
                      LegalCopyrightCopyright 2020 Havy Alegria
                      Assembly Version1.0.0.0
                      InternalNameIRuntimeEvidenceFact.exe
                      FileVersion1.0.0.0
                      CompanyNameHavy Alegria
                      LegalTrademarks
                      Comments
                      ProductNameInnoExtractor
                      ProductVersion1.0.0.0
                      FileDescriptionInnoExtractor
                      OriginalFilenameIRuntimeEvidenceFact.exe
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:1
                      Start time:11:49:12
                      Start date:12/05/2022
                      Path:C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\EXPORT INVOICE.pdf.exe"
                      Imagebase:0xef0000
                      File size:808448 bytes
                      MD5 hash:2CF09341B87D20404A6D824305EA5419
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      Target ID:7
                      Start time:11:49:39
                      Start date:12/05/2022
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 1280
                      Imagebase:0xe20000
                      File size:434592 bytes
                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:high

                      Reset < >

                        Execution Graph

                        Execution Coverage:16.1%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:40
                        Total number of Limit Nodes:5
                        execution_graph 13057 3277f50 13058 3277f9d VirtualProtect 13057->13058 13059 3278009 13058->13059 13060 327c090 13062 327c0b7 13060->13062 13061 327c194 13062->13061 13064 327bd50 13062->13064 13065 327d548 CreateActCtxA 13064->13065 13067 327d64e 13065->13067 13008 a0c3440 13011 a0c3478 13008->13011 13012 a0c3481 13011->13012 13015 a0c34bb 13012->13015 13017 a0c34c0 13015->13017 13016 a0c345f 13017->13016 13019 a0c37f0 13017->13019 13020 a0c3818 13019->13020 13021 a0c391e 13020->13021 13023 a0c4310 13020->13023 13021->13016 13024 a0c4326 13023->13024 13027 a0c4778 13024->13027 13030 a0c47b8 13027->13030 13031 a0c47e9 13030->13031 13032 a0c439c 13031->13032 13035 a0c4828 13031->13035 13040 a0c4838 13031->13040 13032->13021 13037 a0c4838 13035->13037 13036 a0c486e 13036->13032 13037->13036 13045 a0c3d0c 13037->13045 13039 a0c48d9 13042 a0c4859 13040->13042 13041 a0c486e 13041->13032 13042->13041 13043 a0c3d0c DrawTextExW 13042->13043 13044 a0c48d9 13043->13044 13047 a0c3d17 13045->13047 13046 a0c6a51 13046->13039 13047->13046 13050 a0c7650 13047->13050 13053 a0c674c 13050->13053 13054 a0c7688 DrawTextExW 13053->13054 13056 a0c6b64 13054->13056 13056->13039

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 3271768-3271799 1 32717a0-32717c5 0->1 2 327179b 0->2 3 32717c7 1->3 4 32717cc-32717d8 1->4 2->1 3->4 5 32717db 4->5 6 32717e2-32717fe 5->6 7 3271807-3271808 6->7 8 3271800 6->8 18 327197a-327197e 7->18 8->5 8->7 9 3271957-327195a 8->9 10 3271907-327190e 8->10 11 3271874-327188b 8->11 12 3271830-3271834 8->12 13 3271890-32718a7 8->13 14 32718cf-32718d9 8->14 15 327185d-327186f 8->15 16 327180d-327182e 8->16 17 32718ac-32718af 8->17 8->18 31 327195d call 3271ef9 9->31 32 327195d call 3271f08 9->32 21 3271915-3271952 10->21 22 3271910 10->22 11->6 23 3271847-327184e 12->23 24 3271836-3271845 12->24 13->6 19 32718e0-3271902 14->19 20 32718db 14->20 15->6 16->6 29 32718b2 call 32719b0 17->29 30 32718b2 call 32719c0 17->30 19->6 20->19 21->6 22->21 27 3271855-327185b 23->27 24->27 25 32718b8-32718ca 25->6 27->6 28 3271963-3271975 28->6 29->25 30->25 31->28 32->28
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZO$?$?$J
                        • API String ID: 0-2372238481
                        • Opcode ID: 009da93bf3cc9aa33b522222f67d34e8cfaf21c565de85b4b8da8d4d5d817589
                        • Instruction ID: 8e3d4ff03f4055b60ed92f5877dc4041e3080348792a6fdbfd14718a7712441b
                        • Opcode Fuzzy Hash: 009da93bf3cc9aa33b522222f67d34e8cfaf21c565de85b4b8da8d4d5d817589
                        • Instruction Fuzzy Hash: 01513A74E2420A8FDB08CFA6C9406EEFBF2BF89300F24D56AD519A7254D7349A51CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 157 327b52c-327ee9a 160 327eea1-327eec3 call 327d358 157->160 161 327ee9c 157->161 163 327eec8 160->163 161->160 164 327eecf-327eeeb 163->164 165 327eef4-327eef5 164->165 166 327eeed 164->166 168 327f184-327f18b 165->168 166->163 166->165 167 327ef24-327ef4f 166->167 166->168 169 327efa4-327efa7 call 327ea64 166->169 170 327efc3-327efd0 166->170 171 327f042-327f055 166->171 172 327ef0f-327ef22 166->172 173 327f08a-327f167 call a0ce100 166->173 174 327f02a-327f03d 166->174 175 327ef54-327ef9f 166->175 176 327f05a-327f085 166->176 177 327eefa-327ef0d 166->177 167->164 185 327efac-327efbe 169->185 179 327eff3 170->179 180 327efd2-327efdb 170->180 171->164 172->164 205 327f16d-327f17f 173->205 174->164 175->164 176->164 177->164 184 327eff6-327f006 179->184 186 327efe2-327efef 180->186 187 327efdd-327efe0 180->187 194 327f00d-327f025 184->194 195 327f008 184->195 185->164 189 327eff1 186->189 187->189 189->184 194->164 195->194 205->164
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: +@7
                        • API String ID: 0-3361449578
                        • Opcode ID: 4571dc71a13f0172db77bff30eecfcbc959068f8232d7033e2147d9aed41c139
                        • Instruction ID: 4dae1cd42743246896c989a50d829eaa2a368672b61b0a6c10f387fc46a85025
                        • Opcode Fuzzy Hash: 4571dc71a13f0172db77bff30eecfcbc959068f8232d7033e2147d9aed41c139
                        • Instruction Fuzzy Hash: 92915870E25209DFDB04CFA9C9555AEFBB2FF89300F248429D406BB364DB349A81CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f1d11da0a91085ff01788ff88537f658d32bf19b4c0b6ebf9b54d44b0daa87c9
                        • Instruction ID: 7965941444f4c28ac0d88a02fc6188a00d3a824cbe08a69196292aa6f3a31a2f
                        • Opcode Fuzzy Hash: f1d11da0a91085ff01788ff88537f658d32bf19b4c0b6ebf9b54d44b0daa87c9
                        • Instruction Fuzzy Hash: 7C91F374E142198FCB04CFAAC881AEDFBB2FF89300F14912AD819AB254D775A946CF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 81172a903ca1724acdc3893225bd3bdebb0454fc7388548419fc4c7dfaa148d9
                        • Instruction ID: 9b77df05c2a135c6ecdd7b1d1bed897f538adc35a7b5d870bec2dfa18c422339
                        • Opcode Fuzzy Hash: 81172a903ca1724acdc3893225bd3bdebb0454fc7388548419fc4c7dfaa148d9
                        • Instruction Fuzzy Hash: 5881D474E152098FCB04CFAAC9806AEFBB2FF89300F14912AD919AB354DB755945CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.444358119.000000000A0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A0C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a0c0000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8170939d2c25ee1d798cf134c9034cb92884ebe0d0e92035799dc6579db18ab2
                        • Instruction ID: 6b7f2a461dd8a71c0702c23a082a25e68eb799abbb9f6acdbc77f2ae59830163
                        • Opcode Fuzzy Hash: 8170939d2c25ee1d798cf134c9034cb92884ebe0d0e92035799dc6579db18ab2
                        • Instruction Fuzzy Hash: 736125B0D0520EEFDB04CFA5D5815AEFBF2EF89300F24942AC506B7254E7749A45CBA9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76a1e4933f14c3cc1dc15317d254767674eb2d8ab4801fedc73a386de444d457
                        • Instruction ID: ab5b46c95983e193a44e529f301e7804bd55023b6ec76f0d776e1a184f32de43
                        • Opcode Fuzzy Hash: 76a1e4933f14c3cc1dc15317d254767674eb2d8ab4801fedc73a386de444d457
                        • Instruction Fuzzy Hash: 0031E771E006189BDB18CFAAD8446DEFBF7BFC9300F14C16AD509A6268DB744A96CF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db1a659476bfed4771c9a866554d0b967f73fd4c5ade9e7d5876c76fdbf4cef6
                        • Instruction ID: 760577a6c12c638a1f04f3d52ab10d55c35e61481c3ef93b53373aab4cb2f871
                        • Opcode Fuzzy Hash: db1a659476bfed4771c9a866554d0b967f73fd4c5ade9e7d5876c76fdbf4cef6
                        • Instruction Fuzzy Hash: B721BD71E046199BEB58CF6BDC4469EFBF7BFC8304F14C166D808A6254EB3045858F11
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 33 a0c674c-a0c76e2 35 a0c76e4-a0c76f3 33->35 36 a0c76f6-a0c772c 33->36 35->36 37 a0c772e 36->37 38 a0c7732-a0c7793 DrawTextExW 36->38 37->38 39 a0c779c-a0c77de 38->39 40 a0c7795-a0c779b 38->40 40->39
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0A0C7783
                        Memory Dump Source
                        • Source File: 00000001.00000002.444358119.000000000A0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A0C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a0c0000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: 95708691fd5c55ac44d0be4e4cd852bf86b8136bf3207e582b18071c0b96343a
                        • Instruction ID: b2e815704a55e1ba9e74cd71d94625d3399ff42a1c8f859a47dd073394e436cb
                        • Opcode Fuzzy Hash: 95708691fd5c55ac44d0be4e4cd852bf86b8136bf3207e582b18071c0b96343a
                        • Instruction Fuzzy Hash: 425155B8D0525C9FCB50CFA9D584A9EFBF1BB09310F24912AE818BB321E374A945CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 44 327bd50-327d64c CreateActCtxA 49 327d655-327d6da 44->49 50 327d64e-327d654 44->50 59 327d707-327d70f 49->59 60 327d6dc-327d6ff 49->60 50->49 60->59
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 0327D639
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 16fd5ff78dc1d38afe677628fae262ad68968e1d8e8e9a1f1d3f8fe3a1f0274f
                        • Instruction ID: 008ac18ab4311eeea999d43a294da913eaaac919e4b293517919f53cb336e1ec
                        • Opcode Fuzzy Hash: 16fd5ff78dc1d38afe677628fae262ad68968e1d8e8e9a1f1d3f8fe3a1f0274f
                        • Instruction Fuzzy Hash: 5B5103B1D0461C8FDB20DFA4C984BDEBBB5BF45308F1184AAD509BB251DB706A89CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 64 3277f48-3278007 VirtualProtect 66 3278010-327804c 64->66 67 3278009-327800f 64->67 67->66
                        APIs
                        • VirtualProtect.KERNELBASE(?,?,?,?), ref: 03277FF7
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: f9472d134f2f41c5e60a01feab31f5041c587a51b2f151ceffdd2447f9481fdc
                        • Instruction ID: 427685cf3c0d6ffb4d236f2bd8380e435ce54ee23a4550ed3625f81c4070e60d
                        • Opcode Fuzzy Hash: f9472d134f2f41c5e60a01feab31f5041c587a51b2f151ceffdd2447f9481fdc
                        • Instruction Fuzzy Hash: 8E3198B9D042589FCF10CFA9E584AEEFBF0BB59310F14902AE814B7210D775A985CFA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 70 3277f50-3278007 VirtualProtect 72 3278010-327804c 70->72 73 3278009-327800f 70->73 73->72
                        APIs
                        • VirtualProtect.KERNELBASE(?,?,?,?), ref: 03277FF7
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 47b60a62fb71c86164a501d9d33f38b11d898b6105f82e7112cc016df8cc8b72
                        • Instruction ID: 81c69b262136b0700828cc4ff720c3a4c68f5c7deaeb4789bd9dcea6363faf2f
                        • Opcode Fuzzy Hash: 47b60a62fb71c86164a501d9d33f38b11d898b6105f82e7112cc016df8cc8b72
                        • Instruction Fuzzy Hash: E43177B9D042589FCB10CFA9E584AEEFBF1BB19310F14942AE814B7310D775A985CF64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432139020.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_167d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8798e600780225b54c85843bfa63ff89052d290e19532f6c5eacc1c961b246ca
                        • Instruction ID: c3037c2281f938dbfd4344d5e3d169b338a9203b9c9b8b036a89595ba2eb8258
                        • Opcode Fuzzy Hash: 8798e600780225b54c85843bfa63ff89052d290e19532f6c5eacc1c961b246ca
                        • Instruction Fuzzy Hash: 432103B1504244DFEB15DF54D9C0B2ABF65FF88328F24CA69E9054B206C336D856CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432277046.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_168d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc9d30245f11617ee38eefcfc3139f5b63aff7dc0decdfb05265a91f03c9e45c
                        • Instruction ID: 43bd3d101e85873e083d89b096122582c8c428f11c9e90403cd2a33ca09224f5
                        • Opcode Fuzzy Hash: dc9d30245f11617ee38eefcfc3139f5b63aff7dc0decdfb05265a91f03c9e45c
                        • Instruction Fuzzy Hash: 13212571608204DFDB15EF54D9C0B26BB61FB84358F20C669D9494B386C336D847CA71
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432277046.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_168d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d472062cf47020c114248108b368b70e2599f7aa62bebfb584467f2c903a21e
                        • Instruction ID: 48a1bb21ad5bda046d85b1633c1fea2f7d20a7143a0c5e4c7a1635a96e464c17
                        • Opcode Fuzzy Hash: 0d472062cf47020c114248108b368b70e2599f7aa62bebfb584467f2c903a21e
                        • Instruction Fuzzy Hash: EB21D3B1504204EFDB01EF94D9D0B26BB65FB84328F24C6A9EA494B386C336D846CA71
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432277046.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_168d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e08f5c51a10b84adb08514e5a0b9a5cc2779773f80d953d2f568b216de2cdd58
                        • Instruction ID: 75245d8419c8eb3a8eacd7d094ed1a1a05b38a91d6e67021e15d552b44214322
                        • Opcode Fuzzy Hash: e08f5c51a10b84adb08514e5a0b9a5cc2779773f80d953d2f568b216de2cdd58
                        • Instruction Fuzzy Hash: 9521AE755093808FDB03CF24D990B15BF71EB46214F28C6EAD8498B697C33AD84BCB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432139020.000000000167D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0167D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_167d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                        • Instruction ID: 7cb70bfa69d8eee2155b912438671a1459c20bd17b508866a6a0bccb111646b9
                        • Opcode Fuzzy Hash: c702fd562b5f93e8e4b2e9ff7baf791e5e7de14944204115b6362cb0f0e05a08
                        • Instruction Fuzzy Hash: DB11AF76504280DFDB12CF54D9C4B1ABF71FB84324F24C6A9D8450B656C336D45ACBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432277046.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_168d000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                        • Instruction ID: 1cdd53039cb56d7f06175d9be3cb59b49aff8c7ad32892d54b229328b25ba728
                        • Opcode Fuzzy Hash: 6d8453f2856e9fffd06841d27046e1044311c887d38c2cdc4125c35467cc6d87
                        • Instruction Fuzzy Hash: FD11BB75944284DFCB02DF54C9D0B15BFB1FB84324F28C6A9D9494B796C33AD44ACB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp$r
                        • API String ID: 0-3482329945
                        • Opcode ID: 8ec7d719f87a4169f5d3e489dec531a49e1ff9c9e934a3595cc2842f817c766c
                        • Instruction ID: 77093d820579ae452f9a1674938c353a5fe95f50d10188d7433107af4eadd0a8
                        • Opcode Fuzzy Hash: 8ec7d719f87a4169f5d3e489dec531a49e1ff9c9e934a3595cc2842f817c766c
                        • Instruction Fuzzy Hash: 6F516CB8D2520ADFCB04CF95D4814AEFBB2FF89340B10D559C216A7204D774DA86DFA8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: 3e3eac7e0fa050f7ff5df43d21fb8a074f1046a5992236e007fa041dbfbf0c6c
                        • Instruction ID: b94ea8afa0608c4492a0a6e23f938222cab73752f6e6f143f4604a0d88d4dfbb
                        • Opcode Fuzzy Hash: 3e3eac7e0fa050f7ff5df43d21fb8a074f1046a5992236e007fa041dbfbf0c6c
                        • Instruction Fuzzy Hash: 29A1AD74D10217DFCB04DFA5C88299EFBB1FF89300B18C659C525AB204E734A6A6CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: 5a0ef56d27e4e03af199a91b7eb0fdbb0d3ed6f7b461f1aba3d667082e385796
                        • Instruction ID: a9391824b9094975c6675455536935043eb7284daf3c2562f600ef07323b7c46
                        • Opcode Fuzzy Hash: 5a0ef56d27e4e03af199a91b7eb0fdbb0d3ed6f7b461f1aba3d667082e385796
                        • Instruction Fuzzy Hash: 12619D78E2520ADFCB14CF96D8814AEFBB2FF89340F10D569C216A7214D7349A86CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: 6372476a85b43228fbc0645474469df77b3639fe087bdd6bd858cbbc088fe645
                        • Instruction ID: 7db7cad113ee8ae930da4ec761085be49e618afeb32a518cc45bd0646d7caf6b
                        • Opcode Fuzzy Hash: 6372476a85b43228fbc0645474469df77b3639fe087bdd6bd858cbbc088fe645
                        • Instruction Fuzzy Hash: CB519F78D2520ADFCB14CF99C8814AEFBB1FF89350B10D659C212A7214D734D986DF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: d5568d2c0faeeeaaa6269668fc23e556b04d9f348cd3c6487d99cae82d691dc1
                        • Instruction ID: 5e43d49778048b8aa032e839795c05b794f87109f862a72ce642f77928ee78c1
                        • Opcode Fuzzy Hash: d5568d2c0faeeeaaa6269668fc23e556b04d9f348cd3c6487d99cae82d691dc1
                        • Instruction Fuzzy Hash: 50516C78E2520ADFCB04CF95D4814AEFBB2FF89340B20D959C216A7214D774EA86DF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: c3261923b07e76b32137ec51119500d05af21c44efe123b01d49f557cec0292b
                        • Instruction ID: be9c2110634755a6f0e8181051f3766b8b0ccc3357a199663b051a7c55f58042
                        • Opcode Fuzzy Hash: c3261923b07e76b32137ec51119500d05af21c44efe123b01d49f557cec0292b
                        • Instruction Fuzzy Hash: 62517D78D2520ADFCB04CF95D4814AEFBB2FF89340B20D659C512A7214D734DA86DF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ZVFp$ZVFp$ZVFp
                        • API String ID: 0-3154686640
                        • Opcode ID: f23fc95807f050af951236a80d7c70aa1dccecc49babdf12fd022cd6c0806032
                        • Instruction ID: cbf10057936bcef5cf146b3da61212f4c052732094fc2613ccd1a8bee653aab8
                        • Opcode Fuzzy Hash: f23fc95807f050af951236a80d7c70aa1dccecc49babdf12fd022cd6c0806032
                        • Instruction Fuzzy Hash: 06514978E2520ADFCB04CF95D4814AEFBB2FF89340B20D659C216A7214D774EA86DF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: Ju`$Ju`
                        • API String ID: 0-3353033364
                        • Opcode ID: bf0f677397ff0bc0eafd89151096a11691dcfeff23114e2c7cd26c5a225cf827
                        • Instruction ID: f2b4fe35f88bbf868493083a1663c2a1a8a1917d2b02de23de11c6cda95c382e
                        • Opcode Fuzzy Hash: bf0f677397ff0bc0eafd89151096a11691dcfeff23114e2c7cd26c5a225cf827
                        • Instruction Fuzzy Hash: 2A41F6B4E2520ADFCB44CFAAC5815AEFBB2FB89300F24D56AC505B7204D7759A81CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ^8
                        • API String ID: 0-11385890
                        • Opcode ID: 1d60dce52262b111bfa3183df358648b9c179e9257fa8a8d3ff1d3b9c2b456b7
                        • Instruction ID: e0d2f2ac581cda9f38bcb9ce526b76890e42627f02056894f27b31442afc871f
                        • Opcode Fuzzy Hash: 1d60dce52262b111bfa3183df358648b9c179e9257fa8a8d3ff1d3b9c2b456b7
                        • Instruction Fuzzy Hash: F761E270E25619CFCB08CFAAD9804DEFBF2FB89311F24956AD41AB7214D7709A418F54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID: ^8
                        • API String ID: 0-11385890
                        • Opcode ID: b03631b9a6ad2271936e3c9c07334c3de6875768c3e654c3b2916c91739bb8cc
                        • Instruction ID: 88c3d1cbd847441f623a8eaa19daff9444dcf7bc326c990bee3387f2dac942f1
                        • Opcode Fuzzy Hash: b03631b9a6ad2271936e3c9c07334c3de6875768c3e654c3b2916c91739bb8cc
                        • Instruction Fuzzy Hash: 9C51F574E25619CFCB08CFAAD9805DEFBF2FF89210F24956AD416B7314D3349A428B54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.444358119.000000000A0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A0C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_a0c0000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eceeb0057e0912c6751a71686d44efb372e9e40aa0e28a889390e0d87962cba4
                        • Instruction ID: 3a5b4512150042ae86da8e186706a07856d0b3a7c1f0fe84cba9c6a1ae056ca5
                        • Opcode Fuzzy Hash: eceeb0057e0912c6751a71686d44efb372e9e40aa0e28a889390e0d87962cba4
                        • Instruction Fuzzy Hash: 1E025A35B1061A9FCB58CF69C488A6DB7F3BF88610B168169E906DB371EB31EC01CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cdbc3df6889238fb68e72777bb9994e8b193240ff00fa3b75c8ac4eff49fdac3
                        • Instruction ID: c3817d8dc977ee68a07fa8f028074fd75224475b190f861ff823d03e960dd542
                        • Opcode Fuzzy Hash: cdbc3df6889238fb68e72777bb9994e8b193240ff00fa3b75c8ac4eff49fdac3
                        • Instruction Fuzzy Hash: 5A81D074A24219CFCB48DF9AC58489EFBF2FF89350F248559D415AB324D370AA82CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c887da24bba9c96e030fd2fca5981832e0bb056f37ac6441504e44b77e8295e9
                        • Instruction ID: b553824912f5a0c9a782d3add3175f476643ec6d7060ed2c2c46d02c85eafee1
                        • Opcode Fuzzy Hash: c887da24bba9c96e030fd2fca5981832e0bb056f37ac6441504e44b77e8295e9
                        • Instruction Fuzzy Hash: 9681C074A20219CFCB48DF9AC58499EFBF2FF89310F14856AD415AB325D370AA82CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 831e34f874c9be3c1dc3d87f5ccf161bff435efa54cdbaa84b6f948052360fc3
                        • Instruction ID: e9f220e2759ff2f6016841da9a6b3e133046b95e62805e8b049a7c5e2a5bc15e
                        • Opcode Fuzzy Hash: 831e34f874c9be3c1dc3d87f5ccf161bff435efa54cdbaa84b6f948052360fc3
                        • Instruction Fuzzy Hash: 747102B4D2520ACFCB04DFAAD4819AEFBB1FF88310F15955AD415A7314D730A982CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e45adfd4da072dec7560fe9b1ff5cf1b797f48c84f033169de243251d7c000c3
                        • Instruction ID: a3b4db4cde2e8f51e3063fedc351b20885ef8a82c35395b2f691dbe8781888a8
                        • Opcode Fuzzy Hash: e45adfd4da072dec7560fe9b1ff5cf1b797f48c84f033169de243251d7c000c3
                        • Instruction Fuzzy Hash: B261F274D2420ACFCB04DFAAD4849AEFBB2FF89310F15955AD415A7214D730A982CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1845906333a873c117aee4a7a7f606bbacf2f89f6ed3111739cffd9b48c490ed
                        • Instruction ID: 6614ccf6d064d1e0f632cac3f6857a026b5cb648b4e64e65386c19b4066f3ded
                        • Opcode Fuzzy Hash: 1845906333a873c117aee4a7a7f606bbacf2f89f6ed3111739cffd9b48c490ed
                        • Instruction Fuzzy Hash: 44518774E1121ACFCB04CFA9C9829AEFBF1BF89310F188569C515AB320E7309A51CF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0431d3c6f1a274af58a1bc9640f2bec9b71a965dc906a9e3a0cc453ca8ecd12
                        • Instruction ID: 8383f55d7b50c9b9763a64964a3e62464583159708a418ed1bef29589f08e236
                        • Opcode Fuzzy Hash: e0431d3c6f1a274af58a1bc9640f2bec9b71a965dc906a9e3a0cc453ca8ecd12
                        • Instruction Fuzzy Hash: 5841FB70E2560A9FCB04CFAAC5415AEFBF2FF89300F24C46AC519A7254E7749A81CF95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 12e65a57b9980a84e942fa79f090828e12ca79ff7a7fe1739231627036045209
                        • Instruction ID: 4dbff422eb760b124fd2c7f7d12080a25b67cc4eef011db0dbe059872a753e95
                        • Opcode Fuzzy Hash: 12e65a57b9980a84e942fa79f090828e12ca79ff7a7fe1739231627036045209
                        • Instruction Fuzzy Hash: D141E970E2560A9FCB44CFEAC5415AEFBF2BF89300F24D46AC519A7214E7749681CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0bc810fe813d42696d540dc92dc62021619602e3fefc1f9025a039a05f773ae0
                        • Instruction ID: 8015fa308fd6a4ab97901de64410bf0bb1ad18558208377268888ddc2f4570d1
                        • Opcode Fuzzy Hash: 0bc810fe813d42696d540dc92dc62021619602e3fefc1f9025a039a05f773ae0
                        • Instruction Fuzzy Hash: 70415D71E156198BEB28DF6B9D4479EFAF3BFC9300F14C1BA850CA6214EB300A858F51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000001.00000002.432498705.0000000003270000.00000040.00000800.00020000.00000000.sdmp, Offset: 03270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3270000_EXPORT INVOICE.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9c6410fb6487b7081d771e6a787b908d0197400a633687140960aa6abae9392e
                        • Instruction ID: 4bfd6213c040d133e97ec132438b6fc90ded3745cab92d5da1a45da9a106f4a0
                        • Opcode Fuzzy Hash: 9c6410fb6487b7081d771e6a787b908d0197400a633687140960aa6abae9392e
                        • Instruction Fuzzy Hash: 2E4105B4E2520ADFCB04CFAAC5815AEFBF2BB89300F24D56AC405B7204D7359A81CF94
                        Uniqueness

                        Uniqueness Score: -1.00%